You are on page 1of 11

Lecture 14 Security II

By Diana

Operating Systems

Objectives
Secure communication Key agreement protocols Public key infrastructure, certificates and certificates authorities Secure communication protocols Steganography

Operating Systems

Secure communication
The 5 fundamental requirements:
Privacy
Information passed to 3rd party without our knowledge

Integrity
Information sent or received have not been altered or modified

Authentication
Verifying of users identities

Authorization
Users indentification and password is required

Nonrepudiation
Information sent or received legally proven
Operating Systems 3

Key agreement protocols


The process of 2 parties exchanging keys over an unsecure medium 3 types:
Digital envelope Key management
Using key generation to create keys

Digital signature
Authenticates the users identity, difficult to forge
Operating Systems 4

Public key infrastructure, certificates and certificates authorities


PKI
Integrates public key cryptography with digital certificates and certificates authorities to authenticate parties in a transaction

Digital certificates
Digital document that identifies users and is issued by a certificate authority

Certificate authority (CA)


Validated by online certificate status protocol By Microsoft
Operating Systems 5

Secure communication protocols


To implement secure wireless communication The types of protocols:
Secure sockets layer
Secures communication between 2 computers on the internet and web Suitable for online business Supported by many web browsers, IE, Mozilla etc

Virtual private network


Suitable to secure communication channels over public connections Using encryption technique
Operating Systems 6

Secure communication protocols


Internet protocol security
Prevent unauthorized users to spoofing-the attacker stimulates the IP address of the user to access to the resources

Wireless security
to protect wireless LAN
Wired equivalent privacy protocol Wi-fi protected access

Operating Systems

Steganography
Is a practice of hiding an information within another information
Use of digital watermarks
For property protection Able to prevent others to copy the original copy of the owner

Operating Systems

Summary
Secure communication
Privacy Authentication nonrepudiation Digital envelope Key management Digital signature integrity authorization

Key agreement protocols

Operating Systems

Summary
Public key infrastructure, certificates and certificates authorities
Definitions of PKI, digital certificates and CA

Secure communication protocols


Secure sockets layer Virtual private network Internet protocol security Wireless security

Operating Systems

10

Summary
Steganography
Definition of steganography Digital watermarks

Operating Systems

11

You might also like